메뉴 건너뛰기




Volumn 4392 LNCS, Issue , 2007, Pages 21-40

Tackling adaptive corruptions in multicast encryption protocols

Author keywords

Adaptive corruptions; Encryption; Multicast; Selective decryption

Indexed keywords

NETWORK PROTOCOLS; PUBLIC KEY CRYPTOGRAPHY; SECURITY OF DATA;

EID: 38049040237     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-70936-7_2     Document Type: Conference Paper
Times cited : (22)

References (17)
  • 1
    • 85083027758 scopus 로고    scopus 로고
    • Reconciling two views of cryptography (the computational soundness of formal encryption)
    • Martin Abadi and Philip Rogaway. Reconciling two views of cryptography (the computational soundness of formal encryption). Journal of Cryptology, 15(2):103-127, 2002.
    • (2002) Journal of Cryptology , vol.15 , Issue.2 , pp. 103-127
    • Abadi, M.1    Rogaway, P.2
  • 3
    • 85048601848 scopus 로고
    • Cryptographic protocols provably secure against dynamic adversaries
    • Rainer A. Rueppel, editor, Advances in Cryptology -EUROCRYPT'92, of, Springer-Verlag, May
    • Donald Beaver and Stuart Haber. Cryptographic protocols provably secure against dynamic adversaries. In Rainer A. Rueppel, editor, Advances in Cryptology -EUROCRYPT'92, volume 658 of Lecture Notes in Computer Science, pages 307-323. Springer-Verlag, May 1992.
    • (1992) Lecture Notes in Computer Science , vol.658 , pp. 307-323
    • Beaver, D.1    Haber, S.2
  • 6
    • 33745528593 scopus 로고    scopus 로고
    • Universally composable symbolic analysis of mutual authentication and key exchange protocols
    • Shai Halevi and Tal Rabin, editors, TCC '06: Third Theory of Cryptography Conference, of, Springer-Verlag
    • Ran Canetti and Jonathan Herzog. Universally composable symbolic analysis of mutual authentication and key exchange protocols. In Shai Halevi and Tal Rabin, editors, TCC '06: Third Theory of Cryptography Conference, volume 3876 of Lecture Notes in Computer Science, pages 380-403. Springer-Verlag, 2006.
    • (2006) Lecture Notes in Computer Science , vol.3876 , pp. 380-403
    • Canetti, R.1    Herzog, J.2
  • 9
    • 84979291225 scopus 로고
    • Broadcast encryption
    • Douglas R. Stinson, editor, Advances in Cryptology, CRYPTO'93, of, Springer-Verlag, August
    • Amos Fiat and Moni Naor. Broadcast encryption. In Douglas R. Stinson, editor, Advances in Cryptology - CRYPTO'93, volume 773 of Lecture Notes in Computer Science, pages 480-491. Springer-Verlag, August 1993.
    • (1993) Lecture Notes in Computer Science , vol.773 , pp. 480-491
    • Fiat, A.1    Naor, M.2
  • 11
    • 24144482305 scopus 로고    scopus 로고
    • Adaptive security of symbolic encryption
    • J. Kilian, editor, Theory of Cryptography Conference, TCC 2005, of, Cambridge, MA, USA, February, Springer-Verlag, Berlin, Germany
    • Daniele Micciancio and Saurabh Panjwani. Adaptive security of symbolic encryption. In J. Kilian, editor, Theory of Cryptography Conference, TCC 2005, volume 3378 of Lecture Notes in Computer Science, pages 169-187, Cambridge, MA, USA, February 2005. Springer-Verlag, Berlin, Germany.
    • (2005) Lecture Notes in Computer Science , vol.3378 , pp. 169-187
    • Micciancio, D.1    Panjwani, S.2
  • 12
    • 33746382900 scopus 로고    scopus 로고
    • Corrupting one vs. corrupting many: The case of broadcast and multicast encryption
    • Automata, Languages, and Programming: 33rd International Colloquium, ICALP 2006, Proceedings, Part II, of, Springer-Verlag, January
    • Daniele Micciancio and Saurabh Panjwani. Corrupting one vs. corrupting many: The case of broadcast and multicast encryption. In Automata, Languages, and Programming: 33rd International Colloquium, ICALP 2006, Proceedings, Part II, volume 4052 of Lecture Notes in Computer Science. Springer-Verlag, January 2006.
    • (2006) Lecture Notes in Computer Science , vol.4052
    • Micciancio, D.1    Panjwani, S.2
  • 13
    • 35048899313 scopus 로고    scopus 로고
    • Soundness of formal encryption in the presence of active adversaries
    • Moni Naor, editor, TCC 2004: 1st Theory of Cryptography Conference, of, Springer-Verlag, February
    • Daniele Micciancio and Bogdan Warinschi. Soundness of formal encryption in the presence of active adversaries. In Moni Naor, editor, TCC 2004: 1st Theory of Cryptography Conference, volume 2951 of Lecture Notes in Computer Science, pages 133-151. Springer-Verlag, February 2004.
    • (2004) Lecture Notes in Computer Science , vol.2951 , pp. 133-151
    • Micciancio, D.1    Warinschi, B.2
  • 14
    • 0030609312 scopus 로고    scopus 로고
    • Iolus: A framework for scalable secure multicasting
    • Cannes, France, September 14-18
    • Suvo Mittra. Iolus: A framework for scalable secure multicasting. In Proceedings of ACM SIGCOMM, pages 277-288, Cannes, France, September 14-18, 1997.
    • (1997) Proceedings of ACM SIGCOMM , pp. 277-288
    • Mittra, S.1
  • 15
    • 84880852861 scopus 로고    scopus 로고
    • Revocation and tracing schemes for stateless receivers
    • Joe Kilian, editor, Advances in Cryptology, CRYPTO 2001, of, Springer-Verlag, August
    • Dalit Naor, Moni Naor, and Jeffery Lotspiech. Revocation and tracing schemes for stateless receivers. In Joe Kilian, editor, Advances in Cryptology - CRYPTO 2001, volume 2139 of Lecture Notes in Computer Science, pages 41-62. Springer-Verlag, August 2001.
    • (2001) Lecture Notes in Computer Science , vol.2139 , pp. 41-62
    • Naor, D.1    Naor, M.2    Lotspiech, J.3
  • 16
    • 84937420653 scopus 로고    scopus 로고
    • Separating random oracle proofs from complexity theoretic proofs: The non-committing encryption case
    • Moti Yung, editor, Advances in Cryptology, CRYPTO 2002, of, Springer-Verlag, August
    • Jesper Buus Nielsen. Separating random oracle proofs from complexity theoretic proofs: The non-committing encryption case. In Moti Yung, editor, Advances in Cryptology - CRYPTO 2002, volume 2442 of Lecture Notes in Computer Science, pages 111-126. Springer-Verlag, August 2002.
    • (2002) Lecture Notes in Computer Science , vol.2442 , pp. 111-126
    • Buus Nielsen, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.